-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and Ph. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 2:103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, Ph.2
-
2
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
Proc. 10th European Symposium on Research in Computer Security (ESORICS'05)
-
P. Adlo, G. Bana, J. Herzog, and A. Scedrov. Soundness of formal encryption in the presence of key-cycles. In Proc. 10th European Symposium on Research in Computer Security (ESORICS'05), volume 3679 of LNCS, pages 374-396, 2005.
-
(2005)
LNCS
, vol.3679
, pp. 374-396
-
-
Adlo, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
3
-
-
26444497860
-
The Avispa tool for the automated validation of internet security protocols and applications
-
Proc. of Computer Aided Verification (CAV'05)
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The Avispa tool for the automated validation of internet security protocols and applications. In Proc. of Computer Aided Verification (CAV'05), volume 3576 of LNCS, 2005.
-
(2005)
LNCS
, vol.3576
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Héam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
5
-
-
84941153153
-
Key-dependent message security under active attacks
-
M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent message security under active attacks. Cryptology ePrint Archive, Report 2005/421, 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.421
-
-
Backes, M.1
Pfitzmann, B.2
Scedrov, A.3
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - Crypto '93, 13th Annual International Cryptology Conference
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto '93, 13th Annual International Cryptology Conference, volume 773 of LNCS, pages 232-249, 1993.
-
(1993)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), April
-
B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of LNCS, April 2003.
-
(2003)
LNCS
, vol.2620
-
-
Blanchet, B.1
Podelski, A.2
-
9
-
-
27244438198
-
A symbolic decision procedure for cryptographic protocols with time stamps
-
LNCS, London, England. Springer-Verlag
-
L. Bozga, C. Ene, and Y. Lakhnech. A symbolic decision procedure for cryptographic protocols with time stamps. In Proc. 15th International Conference on Concurrency Theory (CONCUR'04), LNCS, pages 177-192, London, England, 2004. Springer-Verlag.
-
(2004)
Proc. 15th International Conference on Concurrency Theory (CONCUR'04)
, pp. 177-192
-
-
Bozga, L.1
Ene, C.2
Lakhnech, Y.3
-
12
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
Proc. of the 14th Int. Conf. on Rewriting Techniques and Applications (RTA'2003). Springer-Verlag, June
-
H. Comon-Lundh and V. Cottier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In Proc. of the 14th Int. Conf. on Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS, pages 148-164. Springer-Verlag, June 2003.
-
(2003)
LNCS
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cottier, V.2
-
17
-
-
33745776339
-
(De)compositions of cryptographic schemes and their applications to protocols
-
R. Janvier, Y. Lakhnech, and L. Mazare. (De)Compositions of Cryptographic Schemes and their Applications to Protocols. Cryptology ePrint Archive, Report 2005/020, 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.20
-
-
Janvier, R.1
Lakhnech, Y.2
Mazare, L.3
-
19
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96). Springer-Verlag, March
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pages 147-166. Springer-Verlag, March 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference (TCC'04)
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, pages 133-151, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
25
-
-
0037453396
-
Protocol insecurity with finite number of sessions and composed keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science, 299:451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|